Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 338))

Abstract

This paper provides break of an image encryption algorithm suggested by Xu et al. recently in [Commun Nonlinear Sci Numer Simulat 19 (10) 3735–3744 2014]. The authors realized a Laplace transformation based synchronization between two fractional-order chaotic systems to execute error-free encryption and decryption of digital images. The statistical analyses show the consistent encryption strength of Xu et al. algorithm. However, a careful probe of their algorithm uncovers underlying security shortcomings which make it vulnerable to cryptanalysis. In this paper, we analyze its security and proposed chosen plaintext-attack/known plaintext-attack to break the algorithm completely. It is shown that the plain-image can be successfully recovered without knowing secret key. The simulation of proposed cryptanalysis evidences that Xu et al. algorithm is not secure enough for practical utilization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hermassi, H., Rhouma, R., Belghith, S.: Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software 85(9), 2133–2144 (2012)

    Article  Google Scholar 

  2. Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  3. Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Communication in Nonlinear Science and Numerical Simulation 15(7), 1887–1892 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  4. Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing 91(4), 949–954 (2011)

    Article  MATH  Google Scholar 

  5. Rhouma, R., Belghith, S.: Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons & Fractals 41(4), 1718–1722 (2009)

    Article  MATH  Google Scholar 

  6. Ahmad, M.: Cryptanalysis of chaos based secure satellite imagery cryptosystem. In: Aluru, S., Bandyopadhyay, S., Catalyurek, U.V., Dubhashi, D.P., Jones, P.H., Parashar, M., Schmidt, B. (eds.) IC3 2011. CCIS, vol. 168, pp. 81–91. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A 372(38), 5973–5978 (2008)

    Article  MATH  Google Scholar 

  8. Özkaynak, F., Özer, A.B., Yavuz, S.: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications 285(2), 4946–4948 (2012)

    Article  Google Scholar 

  9. Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications 283(2), 232–236 (2010)

    Article  Google Scholar 

  10. Sharma, P.K., Ahmad, M., Khan, P.M.: Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 173–181. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  11. Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York (1996)

    MATH  Google Scholar 

  12. Bard, G.V.: Algebraic Cryptanalysis. Springer, Berlin (2009)

    Book  MATH  Google Scholar 

  13. Military Cryptanalysis Part I- National Security Agency, http://www.nsa.gov/public_info/_files/military_cryptanalysis/mil_crypt_I.pdf (last access on August 30, 2014)

  14. Xu, Y., Wang, H., Li, Y., Pei, B.: Image encryption based on synchronization of fractional chaotic systems. Communications in Nonlinear Science and Numerical Simulation 19(10), 3735–3744 (2014)

    Article  MathSciNet  Google Scholar 

  15. Li, R.H., Chen, W.S.: Complex dynamical behavior and chaos control in fractional-order Lorenz-like systems. Chinese Physics B 22(4), 040503 (2012)

    Article  Google Scholar 

  16. Petráš, I.: Fractional-order nonlinear systems modeling, analysis and simulation. Springer, Heidelberg (2011)

    Book  MATH  Google Scholar 

  17. Kerckhoffs’s principle, http://crypto-it.net/eng/theory/kerckhoffs.html (last access on August 28, 2014)

  18. Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28, 662 (1949)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ahmad, M., Khan, I.R., Alam, S. (2015). Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13731-5_41

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13730-8

  • Online ISBN: 978-3-319-13731-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics